Skip to content
Vasilis edited this page Mar 23, 2026 · 3 revisions

OctapusPrime One-Touch Pentest Suite

OctapusPrime is a headless pentesting appliance designed to run on ARM boards (e.g. Neo Pi / Raspberry Pi running DietPi or Debian). It combines 40+ CLI security tools with an advanced IFTTT scenario builder, a WiFi Pwn module for automated WPA handshake capture, and a cyberpunk-themed web interface — all deployable via Docker.


Key Features

  • 40+ Security Tools organised by category (network discovery, web testing, credential attacks, etc.)
  • Advanced IFTTT Scenario Builder — conditional logic, regex variable extraction, dynamic substitution
  • WiFi Pwn Module — Pwnagotchi-style automated handshake capture, deauth, WPA-SEC submission, live spectrum scanner, and AP whitelist
  • Docker Deployment — single docker compose up with network_mode: host and privileged for full hardware access
  • Physical GPIO Trigger — button + LED for headless one-touch scanning and MAC address rotation
  • Dynamic Variable System — regex-based data extraction piped between scenario steps
  • Real-time Monitoring — WebSocket-powered live log streaming and progress tracking
  • State Persistence — WiFi captures, network data and whitelist survive page refreshes and container restarts

Wiki Contents

Page Description
Features Full feature breakdown with screenshots
Prerequisites Hardware & software requirements
Installation Guide Bare-metal and Docker installation
Usage Guide Web UI walkthrough, scenario builder, GPIO
WiFi Pwn Module Handshake capture, auto-hunt, spectrum scanner, whitelist
API Reference Complete REST API documentation
Troubleshooting Common issues & fixes

Quick Start (Docker)

git clone https://github.com/Slayingripper/OctapusPrime.git
cd OctapusPrime
sudo docker compose up --build -d

Open http://<device-ip>:8080 in your browser.


License

MIT — see LICENSE.

Disclaimer: OctapusPrime is for authorised security testing and education only. Only use it on systems you own or have explicit permission to test.

Clone this wiki locally